4.6 Article

Explaining the Attributes of a Deep Learning Based Intrusion Detection System for Industrial Control Networks

Journal

SENSORS
Volume 20, Issue 14, Pages -

Publisher

MDPI
DOI: 10.3390/s20143817

Keywords

deep learning; industrial control network; intrusion detection system; layer-wise relevance propagation

Funding

  1. Beijing Municipal Natural Science Foundation-Haidian original innovation joint fund [19L2020]
  2. Foundation of Science and Technology on Information Assurance Laboratory [614211204031117]
  3. Beijing Polytechnic Research Fund [2017Z004-008-KXZ]
  4. Industrial Internet Innovation and Development Project (Typical application and promotion project of the security technology for the electronics industry) of the Ministry of Industry and Information Technology of China in 2018
  5. Foundation of Shaanxi Key Laboratory of Network and System Security [NSSOF1900105]
  6. International Research Cooperation Seed Fund of Beijing University of Technology [2018-B9]

Ask authors/readers for more resources

Intrusion detection is only the initial part of the security system for an industrial control system. Because of the criticality of the industrial control system, professionals still make the most important security decisions. Therefore, a simple intrusion alarm has a very limited role in the security system, and intrusion detection models based on deep learning struggle to provide more information because of the lack of explanation. This limits the application of deep learning methods to industrial control network intrusion detection. We analyzed the deep neural network (DNN) model and the interpretable classification model from the perspective of information, and clarified the correlation between the calculation process of the DNN model and the classification process. By comparing the normal samples with the abnormal samples, the abnormalities that occur during the calculation of the DNN model compared to the normal samples could be found. Based on this, a layer-wise relevance propagation method was designed to map the abnormalities in the calculation process to the abnormalities of attributes. At the same time, considering that the data set may already contain some useful information, we designed filtering rules for a kind of data set that can be obtained at a low cost, so that the calculation result is presented in a more accurate manner, which should help professionals lock and address intrusion threats more quickly.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available